From nobody Fri Jan 9 08:52:36 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1766595856; cv=none; d=zohomail.com; s=zohoarc; b=afh1GLZFTkEt7WEK5TQBr6fvdDU1jKbD0I1upNGk+r21DtA1/MC1zIZXbFN7d3OmpNwk5CGQZwd/KxNAvfQc3G0fxjPQ6QAH/jhdPy6c/ftJgBjPZ6Ps4U1J593ooYtR4c/apBV3VrVVqPayRK2DVQkqul5zRQzr3oO9R3dE5vg= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1766595856; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=+6n/yOP3bwyBec0cz6YcBSWP9PQeZ3Kxu2XaTVIzNOk=; b=brrwTaDkmFDEZmJsXgzqkUEnNDkfA7Dyx2jF++aJqIxkKgmO56OaFJW3Vgn3dfpy7+HVWleJP6pNEgqJgNwaClkb+oHzk6ngYq+Iwm19GCb5fxiC5W591ISbaWQKJLoq1Rprj1H7VQOMzhyRuUmDBdE1E/C443bm3k4TxqS/I+M= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1766595856520121.5568281039125; Wed, 24 Dec 2025 09:04:16 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1192959.1512066 (Exim 4.92) (envelope-from ) id 1vYSHA-0005r1-0K; Wed, 24 Dec 2025 17:03:52 +0000 Received: by outflank-mailman (output) from mailman id 1192959.1512066; Wed, 24 Dec 2025 17:03:51 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vYSH9-0005pY-NR; Wed, 24 Dec 2025 17:03:51 +0000 Received: by outflank-mailman (input) for mailman id 1192959; Wed, 24 Dec 2025 17:03:49 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vYSH7-0003CV-35 for xen-devel@lists.xenproject.org; Wed, 24 Dec 2025 17:03:49 +0000 Received: from mail-ej1-x62e.google.com (mail-ej1-x62e.google.com [2a00:1450:4864:20::62e]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 839eed93-e0ea-11f0-b15c-2bf370ae4941; Wed, 24 Dec 2025 18:03:48 +0100 (CET) Received: by mail-ej1-x62e.google.com with SMTP id a640c23a62f3a-b7ffa5d1b80so761541766b.0 for ; Wed, 24 Dec 2025 09:03:48 -0800 (PST) Received: from fedora (user-109-243-71-38.play-internet.pl. [109.243.71.38]) by smtp.gmail.com with ESMTPSA id a640c23a62f3a-b8037ab7f7bsm1798927766b.18.2025.12.24.09.03.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 24 Dec 2025 09:03:47 -0800 (PST) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 839eed93-e0ea-11f0-b15c-2bf370ae4941 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1766595828; x=1767200628; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=+6n/yOP3bwyBec0cz6YcBSWP9PQeZ3Kxu2XaTVIzNOk=; b=RuDeQIWdrf9Wl6S/zUNA8ovCOt08MJiHa4Xe0IfBjlm1xAk3e1U5PPqjplZUQJMidT M+ApdGS24i7IDYAEME/EXL2uiHYM7g5ITxjPuf0pEcQsCWMYlT8jI0DEFdWOW8gr188v g2cDvOnXzriWRjRCQLH3JZ4r7SiBlZwfz1+kx1r/9aLg+ccYMMX1FJ948CXU7PVG09yP DTSvWvRg4gu0KjpocIkq/jDYE2Kju1M/MgQPv6m8N9bYOAUt67dmCTiaed0eJRzenKeB IomP8ZYz7w5NRC94IlURo5vCgZiHynePNLcodv2BGiCLyV1v9ZVgLhWwKWpdmpLAmRR7 IkmA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1766595828; x=1767200628; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=+6n/yOP3bwyBec0cz6YcBSWP9PQeZ3Kxu2XaTVIzNOk=; b=Xi4mwjrbhRU7QB86rDTiFYygg2uAUal8oR6MBBn7aaQ1IDR8V0pkTkeCcz06UQW9FQ 02WRQWo5N6pY89KryYU0DxRofG/kOYOB1XYJEfoeNbLBuUVSaarj1cOSeGop8jXlwzEd 8NLnBkd+nlv8zMneW2f+l0fozvspRp8PPCrHhs3j15nCCVUhM2Yfxv/TqagzRKqpyEhm R512dPcPEjhKECNxX2XAMB+ZiWHap3DhyW8BoVlHMWBxZMS5k5nNUAYanq9NLoWdeYRx v1tDo48tTXAq7Yku/9Yh/4eBSeg3hh//tayZpjbDaM6WzxqZSmhimRiRoKmPpLkpxCJK I6Mg== X-Gm-Message-State: AOJu0Yxr8U5teyWTQ6O5KFrDdgu7/cuBxwHNy+frWo774J9kDbvsnFBF Qeds/W+GpdpuaMY5nEDJSQQAIdRSVwndtw2uvsv1uAaoAfQ9Gzo9MwohRi8aAQ== X-Gm-Gg: AY/fxX65YyluJbOV6Mr1wzL7g1K4jJz23G+Yyq8llB1pa2SdxIJDlPlQDR530U/6XLq Aqtfpga9cx9XwKRARWE53SGdWBFs8rEDCOX4I+3hPNG9w+lgvwMHWSJFE5aKOOTPnwSNVc8fn9c 8Sgox9ZSDEHsVd+l9DewT36aL2ZR4Lknxd0zzrkglVuNPIKcvCvwzpnvA42ypzfmrsjBPiR5lma VKNPjSsEwbBKrmgKcjiAgCXOTbTd4ASv3U/VtmNSbAiYQFg12PpMZOs7eEEBZqokNVhXL3UrkKv joycJALXb+ZCcsFR4mwvi2E6Cx9mBN2epdnR9j08BHDsJCkejNB4l6xlpOPW6ekTwjfaBiiD2lg TeKB4zrE2n+Xb8nXZOM41vxMFxhGlQJE/EZqy5/ZC9PVtpZB4ZvU8xCPjXWDTQbWINAIu1wCLr1 cco+9uuActqFACYmste9FXIY8sH2zY3R5uldtUWD0sGQu7x42Eky3tepo= X-Google-Smtp-Source: AGHT+IGr4zgf4fLfUd2DDKV1cqCs5XI4c7sJYGYVApGkKJiqD3dWds42+WeKTJopx3ZyanuXcdWGLw== X-Received: by 2002:a17:907:7eaa:b0:b73:885b:7554 with SMTP id a640c23a62f3a-b80371d5059mr1936670666b.45.1766595827506; Wed, 24 Dec 2025 09:03:47 -0800 (PST) From: Oleksii Kurochko To: xen-devel@lists.xenproject.org Cc: Oleksii Kurochko , Alistair Francis , Bob Eshleman , Connor Davis , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Stefano Stabellini Subject: [PATCH v1 12/15] xen/riscv: introduce sbi_set_timer() Date: Wed, 24 Dec 2025 18:03:25 +0100 Message-ID: <84cf8fb2331614c6d0cc6e9030571f42bfc6d928.1766595589.git.oleksii.kurochko@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1766595857706158500 Content-Type: text/plain; charset="utf-8" Introduce pointer to function which points to a specific sbi_set_timer() implementation. It is done in this way as different OpenSBI version can have different Extenion ID and/or funcion ID for TIME extension. sbi_set_time() programs the clock for next event after stime_value time. This function also clears the pending timer interrupt bit. Introduce extension ID and SBI function ID for TIME extension. Implement only sbi_set_timer_v02() as there is not to much sense to support earlier version and, at the moment, Xen supports only v02. Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/include/asm/sbi.h | 17 +++++++++++++++++ xen/arch/riscv/sbi.c | 26 ++++++++++++++++++++++++++ 2 files changed, 43 insertions(+) diff --git a/xen/arch/riscv/include/asm/sbi.h b/xen/arch/riscv/include/asm/= sbi.h index a88d3d57127a..c54dc7642ff1 100644 --- a/xen/arch/riscv/include/asm/sbi.h +++ b/xen/arch/riscv/include/asm/sbi.h @@ -33,6 +33,7 @@ =20 #define SBI_EXT_BASE 0x10 #define SBI_EXT_RFENCE 0x52464E43 +#define SBI_EXT_TIME 0x54494D45 =20 /* SBI function IDs for BASE extension */ #define SBI_EXT_BASE_GET_SPEC_VERSION 0x0 @@ -65,6 +66,9 @@ =20 #define SBI_SPEC_VERSION_DEFAULT 0x1 =20 +/* SBI function IDs for TIME extension */ +#define SBI_EXT_TIME_SET_TIMER 0x0 + struct sbiret { long error; long value; @@ -138,6 +142,19 @@ int sbi_remote_hfence_gvma(const cpumask_t *cpu_mask, = vaddr_t start, int sbi_remote_hfence_gvma_vmid(const cpumask_t *cpu_mask, vaddr_t start, size_t size, unsigned long vmid); =20 +/* + * Programs the clock for next event after stime_value time. This function= also + * clears the pending timer interrupt bit. + * If the supervisor wishes to clear the timer interrupt without schedulin= g the + * next timer event, it can either request a timer interrupt infinitely far + * into the future (i.e., (uint64_t)-1), or it can instead mask the timer + * interrupt by clearing sie.STIE CSR bit. + * + * This SBI call returns 0 upon success or an implementation specific nega= tive + * error code. + */ +extern int (*sbi_set_timer)(uint64_t stime_value); + /* * Initialize SBI library * diff --git a/xen/arch/riscv/sbi.c b/xen/arch/riscv/sbi.c index 425dce44c679..206ea3462c50 100644 --- a/xen/arch/riscv/sbi.c +++ b/xen/arch/riscv/sbi.c @@ -249,6 +249,26 @@ static int (* __ro_after_init sbi_rfence)(unsigned lon= g fid, unsigned long arg4, unsigned long arg5); =20 +static int cf_check sbi_set_timer_v02(uint64_t stime_value) +{ + struct sbiret ret; + +#ifdef CONFIG_RISCV_64 + ret =3D sbi_ecall(SBI_EXT_TIME, SBI_EXT_TIME_SET_TIMER, stime_value, 0, + 0, 0, 0, 0); +#else + ret =3D sbi_ecall(SBI_EXT_TIME, SBI_EXT_TIME_SET_TIMER, stime_value, + stime_value >> 32, 0, 0, 0, 0); +#endif + + if ( ret.error ) + return sbi_err_map_xen_errno(ret.error); + else + return 0; +} + +int (* __ro_after_init sbi_set_timer)(uint64_t stime_value); + int sbi_remote_sfence_vma(const cpumask_t *cpu_mask, vaddr_t start, size_t size) { @@ -326,6 +346,12 @@ int __init sbi_init(void) sbi_rfence =3D sbi_rfence_v02; printk("SBI v0.2 RFENCE extension detected\n"); } + + if ( sbi_probe_extension(SBI_EXT_TIME) > 0 ) + { + sbi_set_timer =3D sbi_set_timer_v02; + printk("SBI v0.2 TIME extension detected\n"); + } } else panic("Ooops. SBI spec version 0.1 detected. Need to add support"); --=20 2.52.0